2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments. [polldaddy...

2012 has been quite the year for the mobile security industry. We’ve seen bring your own device (BYOD) come to the forefront of discussions, both in terms of its benefits and threats to network security. We’ve seen multiple strands of different trojans and malware that cost companies hundreds of thousands of dollars. Microsoft released Windows 8, thus sparking the debate over exclusively relying on DirectAccess in lieu of virtual private networks (VPNs). As a result of these major trends, we’re beginning to see industry-wide recognition that simple password protection is no longer sufficient. Rather, such techniques as split tunneling, two-factor authentication, and encryption offer safer ways to access corporate networks remotely. So we want to know, given the growing spotlight on threats to remote access, what solutions do you think should lead the charge for enhanced network security in the coming year? As always, feel free to elaborate in the comments. [polldaddy...

NCP engineering announced this week that its Secure Enterprise Management 3.0 would enable powerful Two-Factor Authentication with a One-Time Password that users receive via SMS. This made us wonder, what is your preferred method for Two-Factor Authentication? Don’t see yours listed below? Feel free to let us know what it is in the comments. [polldaddy...

NCP engineering announced this week that its Secure Enterprise Management 3.0 would enable powerful Two-Factor Authentication with a One-Time Password that users receive via SMS. This made us wonder, what is your preferred method for Two-Factor Authentication? Don’t see yours listed below? Feel free to let us know what it is in the comments. [polldaddy...

Over the past week, we’ve featured a series of installments that answer your questions about VPNs and DirectAccess. Of particular interest to you were the hardware requirements for DirectAccess, if DirectAccess supercedes VPNs, and what issues Microsoft could improve or optimize. Before releasing Part 4 of the series, we want to know: How often do you actually use DirectAccess? As always, please elaborate in the comments. [polldaddy...

Over the past week, we’ve featured a series of installments that answer your questions about VPNs and DirectAccess. Of particular interest to you were the hardware requirements for DirectAccess, if DirectAccess supercedes VPNs, and what issues Microsoft could improve or optimize. Before releasing Part 4 of the series, we want to know: How often do you actually use DirectAccess? As always, please elaborate in the comments. [polldaddy...